[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

CAN-2004-0488



"Stack-based buffer overflow in the 
ssl_util_uuencode_binary function in ssl_util.c for 
Apache mod_ssl, when mod_ssl is configured to trust 
the issuing CA, may allow remote attackers to execute 
arbitrary code via a client certificate with a long 
subject DN."

Do ProPolice or W^X impact this?

One assumes that if the buffer in question is on the stack ProPolice will catch it...